Architecture

Understanding the technical design and system components of Zcrypt

System Overview

Zcrypt is built on a modern, scalable architecture that combines client-side cryptography, blockchain integration, and decentralized messaging. The system is designed to maximize privacy while maintaining high performance and user experience.

Client-Side Cryptography

All sensitive operations happen in the browser. Zero-knowledge proofs are generated client-side, ensuring no secrets ever leave your device.

Solana Blockchain

Leverages Solana's high-performance blockchain for fast, low-cost transactions and on-chain verification.

Distributed Storage

Messages and data are stored in a distributed manner, with encryption keys derived from user credentials.

Serverless Backend

API routes handle message routing and real-time updates without storing sensitive user data.

Architecture Layers

1

Presentation Layer

Built with Next.js 14 and React, providing a modern, responsive user interface. Styled with Tailwind CSS and enhanced with Framer Motion animations.

Next.js 14React 18TypeScriptTailwind CSS
2

Cryptography Layer

Implements zero-knowledge proof generation and verification, along with end-to-end encryption for messages. Uses industry-standard libraries.

@noble/hashestweetnaclZcrypt
3

Blockchain Layer

Integrates with Solana blockchain for wallet management, transactions, and on-chain verification of proofs.

@solana/web3.js@solana/spl-tokenSolana Programs
4

API Layer

Serverless API routes handle message routing, user management, and real-time synchronization without storing sensitive data.

Next.js API RoutesServerless Functions

Authentication Data Flow

  1. 1

    User enters credentials

    Username and ZK secret entered in browser

  2. 2

    Generate ZK proof

    Client-side proof generation proving knowledge of secret

  3. 3

    Derive wallet

    Solana keypair derived from ZK secret deterministically

  4. 4

    Submit proof

    Proof sent to server for verification (secret never transmitted)

  5. 5

    Verify and authenticate

    Server verifies proof and grants access without knowing the secret

Security Considerations

✓ Zero-Knowledge Authentication

Credentials never leave the client. Even if the server is compromised, attackers cannot derive user secrets from stored proofs.

✓ End-to-End Encryption

Messages are encrypted client-side before transmission. Only the intended recipient can decrypt them.

✓ On-Chain Verification

Critical operations can be verified on Solana blockchain, providing transparent and immutable audit trail.

✓ No Single Point of Failure

Decentralized architecture ensures the system remains operational even if individual components fail.

Learn More

Dive deeper into specific aspects of the system architecture.